Reg.
No:
B.E./B.Tech. DEGREE MODEL EXAMINATION, APRIL/MAY 2023
Sixth Semester
Computer Science and Engineering
CCS354 -Network Security
(Regulation 2021)
Duration: Three Hours Timing:1.30pm to 4.30pm
Date: 19.5.2025 Maximum: 100 marks
Answer All Questions
PART– A (10 x 2 = 20 Marks)
1. Define an Attack and its types?
2. Describe authentication?
3. Define Key and its type ?
4. Define Key management.
5. Write short notes on HTTP and HTTP’s?
6. Explain the function of NAC?
7. Why is the segmentation and reassembly function in PGP needed?
8. List out the three element in mobile device security.
9. Define password management?
10. Describe Cloud and IOT Security
PART – B (5 x 13= 65 Marks)
PART – B (5 X 13 = 65 MARKS)
11 .I.Discuss in detail what a digital signature is. Explain how digital signatures work and their
importance in ensuring data integrity and authentication. (13 )
(OR)
11 .ii.Discuss the various operation in the hash function. (13 )
12 .i.Discuss in details about the X.509. (13 )
(OR)
12 ii.Explain in details about the Kerberos operation. (13 )
13.I.Write detailed notes on Secure Socket Layer (SSL). Explain its purpose, working mechanism, and
role in securing internet communications. (13 )
(OR)
13.ii.Explain the various functional operation of internet protocol security(IP Sec). (13 )
14.I.Define is PGP? What are the main cryptographic techniques used in PGP? (13 )
(OR)
14.ii.What is S/MIME? Explain in detail how S/MIME provides security for email communication.
(13 )
15.I.What is a firewall? Explain its main characteristics and various types. How does a firewall help in
protecting a computer network? (13 )
(OR)
15.ii.What is Intrusion Detection? Explain in detail the working of an Intrusion Detection System
(IDS), its types, and how it helps in securing a computer network. (13 )
PART – C (1 X 15 = 15 MARKS)(Compulsory)
16.I.Discuss the concept of Public Key Cryptography. Explain how it works and its importance in
modern security systems. (15)
(OR)
16.ii.Define Cloud Security and Internet of Things (IoT) Security. Explain in detail the operations
involved in securing cloud environments and IoT devices. (15)
******************* ALL THE BEST****************
Prepared by Approved by